HIPAA-Compliant Information Sharing: What You Can Share Without Violations
HIPAA-compliant information sharing lets you support care, run your practice, and protect privacy at the same time. This guide explains what you can share under the HIPAA Privacy Rule, how to limit risk with the Minimum Necessary Standard, and where patient permission or de-identification is required.
Permissible Uses and Disclosures
Protected Health Information (PHI) may be used or disclosed without an authorization when the HIPAA Privacy Rule explicitly permits it. The most common pathway is treatment, payment, and health care operations (often called “TPO”). You can exchange PHI with other providers for treatment, submit claims, conduct quality improvement, and carry out audits that keep care safe and efficient.
Core pathways that do not require authorization
- Treatment: Coordination and consultation between providers, referrals, medication management, and care continuity.
- Payment: Eligibility checks, billing, collections, and utilization review.
- Health Care Operations: Quality assessment, training, accreditation, credentialing, and business management.
- Public Health and Safety: Reporting certain diseases, adverse events, and exposures; recalls; and notifications to prevent or control disease.
- Health Oversight: Audits, inspections, licensure, and investigations by oversight agencies.
- Judicial and Administrative Proceedings: Disclosures in response to valid court orders or lawful subpoenas with required safeguards.
- Law Enforcement and Specialized Government Functions: Limited disclosures for locating a suspect, reporting certain injuries, or national security needs.
- Decedents and Organ Donation: To coroners, medical examiners, funeral directors, and organ procurement organizations.
- Serious and Imminent Threat: To reduce or prevent a serious threat to health or safety, using professional judgment.
- Research: With Institutional Review Board or Privacy Board waiver, a Limited Data Set with a data use agreement, or patient authorization.
- Workers’ Compensation and Required-by-Law Disclosures: Where another law mandates disclosure.
Authorized Disclosures
When a purpose is not otherwise permitted, obtain a valid written authorization that specifies what PHI will be shared, with whom, for what purpose, and when it expires. Marketing, sale of PHI, and most uses of psychotherapy notes generally require authorization. Keep revocation and expiration processes clear for Covered Entity Compliance.
Compliance guardrails
- Document your legal basis for each disclosure and apply the Minimum Necessary Standard when it applies.
- Use business associate agreements when vendors access PHI.
- Train staff to recognize permitted vs. Authorized Disclosures and to escalate uncertain requests.
De-Identification of PHI
Once PHI undergoes Data De-Identification, it is no longer PHI and may be shared without HIPAA restrictions. Two methods are acceptable: Expert Determination (a qualified expert documents very small re-identification risk) or Safe Harbor (remove specific identifiers).
Safe Harbor: remove these identifiers
- Names.
- All geographic subdivisions smaller than a state, except limited ZIP code groupings.
- All elements of dates (except year) related to an individual; ages over 89 must be aggregated to 90+.
- Telephone, fax, and email addresses.
- Social Security, medical record, health plan beneficiary, and account numbers.
- Certificate/license numbers, vehicle and device identifiers.
- Web URLs and IP addresses.
- Biometric identifiers (fingerprints, voiceprints).
- Full-face photos and comparable images.
- Any other unique identifying number, characteristic, or code.
Limited Data Set vs. fully de-identified
A Limited Data Set removes direct identifiers but may retain certain dates and general geography; it requires a data use agreement and is restricted to research, public health, or health care operations. Fully de-identified data has no HIPAA limits, but you should still assess re-identification risk.
Sharing with Family and Friends
You may share PHI relevant to a person’s involvement in the patient’s care or payment if the patient agrees, has the opportunity to agree or object and does not object, or if the patient is incapacitated and you use professional judgment. Verify the relationship when reasonable and limit information to what is pertinent.
Practical examples
- Confirming discharge instructions with a spouse present when the patient does not object.
- Allowing a friend to pick up a prescription, sharing only what is necessary to fulfill the request.
- Updating a parent about a minor’s condition when the parent is the personal representative under applicable law.
- When a patient is unconscious, sharing a status update with a close family member if it is in the patient’s best interests.
Minimum Necessary Rule
The Minimum Necessary Standard requires you to use, disclose, and request only the PHI needed to accomplish the purpose. It applies to most non-treatment activities (for example, payment, operations, and many routine disclosures) and to business associates acting on your behalf.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.
Key exceptions
- Treatment: Disclosures to or requests by another provider for treatment are exempt.
- Disclosures to the individual patient, pursuant to their rights of access.
- Disclosures required by law, to HHS for compliance, or pursuant to valid authorizations.
How to implement
- Role-based access and default “need-to-know” settings in systems.
- Standardized, minimum-data templates for recurring requests.
- Verification and logging for unusual or one-off disclosures.
- Periodic audits to confirm adherence and adjust scopes.
Social Media Sharing
Public posts, comments, images, and even acknowledgments can expose PHI. Do not share any patient-identifying details on social platforms without a valid authorization, and be cautious: “anonymized” anecdotes can re-identify patients through rare conditions, dates, or locations.
Do’s and don’ts
- Do obtain written authorization before posting any story, testimonial, or image that could identify a patient.
- Do use training, pre-approval workflows, and content review to maintain Covered Entity Compliance.
- Don’t reply to reviews in a way that confirms someone is your patient.
- Don’t share photos, appointment details, or unique situations that could indirectly identify a person.
Breach considerations
Improper posts can constitute a breach. Activate your incident response, mitigate harm, and follow Breach Notification Requirements, which may include notifying affected individuals and reporting to regulators based on the incident’s scope.
Patient Consent
HIPAA distinguishes general consent practices from formal authorization. Many organizations collect general consent for TPO, but the Privacy Rule does not require it for TPO. Uses and disclosures beyond permitted purposes—such as most marketing, research without a waiver, or sharing with media—require a HIPAA-compliant authorization.
Documenting permissions
- Specify the information to be disclosed, purpose, recipient, expiration date or event, and the right to revoke.
- Provide a copy to the patient and retain records per policy.
- Screen for stricter state laws or special categories (for example, certain behavioral health or substance use information).
Emergency Situations
In emergencies or disasters, you may share PHI to treat the patient, coordinate with first responders, contact family, or reduce a serious and imminent threat to health or safety. Share only what is needed and rely on professional judgment when the patient cannot agree or object.
Disclosures to disaster relief organizations can help reunite families. Continue to apply safeguards and limit details to the minimum necessary for the purpose. After the event, document decisions and evaluate whether any notification duties apply.
Key takeaways
- Know the permitted pathways and use them confidently for care, operations, and safety.
- Prefer de-identified or Limited Data Set information when possible.
- Apply the Minimum Necessary Standard to routine non-treatment activities.
- Use authorizations for non-permitted purposes and keep records to support compliance.
- Train staff on social media risks and incident response, including Breach Notification Requirements.
FAQs
What types of information can be shared without violating HIPAA?
You may share PHI for treatment, payment, and health care operations; for certain public health and oversight activities; when required by law; to avert a serious threat; for certain research frameworks; and with disaster relief efforts. You may also share de-identified data, or a Limited Data Set with a data use agreement, and directory information when the patient has an opportunity to agree or object and does not object.
When is patient consent required for information sharing?
HIPAA does not require consent for TPO. Formal authorization is required for uses and disclosures not otherwise permitted—such as most marketing, sale of PHI, media releases, or research without a waiver. Organizations may choose to obtain general consent as part of their intake, and state laws may impose additional requirements.
How does the minimum necessary rule apply to disclosures?
Disclose only the least amount of PHI needed for the purpose. It applies to most non-treatment disclosures and internal uses, and to requests you make of others. It does not apply to treatment disclosures, to disclosures to the patient, to those required by law, to HHS for compliance, or when a valid authorization specifies the information to be shared.
Are incidental disclosures considered HIPAA violations?
Incidental disclosures are not violations when they occur as a byproduct of an otherwise permissible use or disclosure and when you have applied reasonable safeguards and the Minimum Necessary Standard. If safeguards are lacking or the disclosure goes beyond what is permitted, it may be a violation and could trigger Breach Notification Requirements.
Ready to simplify HIPAA compliance?
Join thousands of organizations that trust Accountable to manage their compliance needs.